Uploaded on May 11, 2023
Hardware and software systems that communicate with the physical world are collectively referred to as operational technology (OT). With a desire to integrate IT skills into physical systems that either replace or enhance the current physical control components, it has developed steadily through time. https://www.infosectrain.com/courses/ot-security-fundamental-training/
OT ICS SECURITY FOUNDATION COURSE
EARLY BIRD OFFER
INR 14,999+ TAXES
INR 24,999
USD 249
OT/ICS USD 499
Security Foundation
Training *T&C Apply
20 hrs of instructor-led training
Blended learning delivery model
Comprehensive introduction to OT/ICS
security for IT and OT professionals
REGISTER NOW
SPEAKER
Manjunath
14+ Years Of Experience
ANSI/IEC 62443
Cyber Security Expert @infosectrain
*T&C Apply
OT/ICS Security Foundation
Course Benefits
$150000
$104436
$135200 $90623 $97000
$75221 $96351 $90090
OT/ICS Security OT/ICS Security OT/ICS Cyber Incident Compliance and OT/ICS OT/ICS OT/ICS
Analyst Consultant Security Response Risk Management Security Project Manager Security
Architect Specialist Specialist Engineer Sales Engineer
HIRING COMPANIES
@infosectrain
Course ADVISOR
Manjunath
14+ years of experience as an Industrial Automation and
Control System specialist in designing & delivering Secure
Industrial Control Systems.
Manjunath holds in-depth expertise on Risk assessment,
vulnerability assessment and upgrading existing plants to
security enhanced systems. Well versed with NIST,
NERC-CIP, and ABS Marine Cyber Safety Standards, he has
gained extensive knowledge and experience in
Process Control Network Design, Network Segmentation,
Network Monitoring Systems, Nozomi IDS solution, Identity
and Access Management, Firewall configurations, Patch
Management and STIG Management.
@infosectrain
Course CONTENT
Introduction to OT/ICS Security
• Overview of OT and ICS
• Importance of OT/ICS Security
• Differences between IT and OT Security
Understanding OT/ICS Components
and Architecture
• Key Components in OT/ICS (PLCs, RTUs, DCS, SCADA, HMI,
Engineering Workstation etc.,)
• ICS Network Architecture and Protocols
• ICS Network Segmentation and Zoning
@infosectrain
Threat Landscape and Vulnerabilities
• Common OT/ICS Threats and Attack Vectors
• Vulnerabilities in OT/ICS Systems
• Notable Incidents and Case Studies
Risk Assessment and Management
• Risk Assessment Methodologies for OT/ICS
• Mitigation Strategies and Risk Treatment
• Monitoring and Incident Response Planning
@infosectrain
OT/ICS Security Best Practices and Standards
• Overview of OT/ICS Security Standards (NIST 800-82, IEC62443,
NERC CIP, Sector Specific standards)
• Security Policies, Procedures, and Controls.
• Physical and Environmental Security Considerations.
Overview of Tools and Technologies for
OT/ICS Security
• Network Traffic Analysis Tools (e.g., Wireshark)
• Network Monitoring and Anomaly Detection Solutions
(e.g., Suricata, Snort)
• Firewall and Security Solutions for OT/ICS Environments
@infosectrain
BECOME AN EXPERT IN
OT/ICS
Security Foundation Training
ENROLL NOW
www.infosectrain.com I [email protected]
Comments